David Galindo 


Lecturer in Computer Security
Security and Privacy Group

School of Computer Science
University of Birmingham
Contact


Program Committee

2016   ACISP 2016 - PROVSEC 2016 - IWSEC 2016 - TrustCom 2016
2015   INTRUST 2015 - INDOCRYPT 2015 - PROVSEC 2015 - IWSEC 2015 - TrustCom 2015
2014   PROVSEC 2014 - IWSEC 2014
2013   IWSEC 2013
2012   ICISC 2012 - WISA 2012 - Provsec 2012 - IWSEC 2012
2011   ICISC 2011 - WISA 2011 - CANS 2011 - ACSA 2011 - ACNS 2011 - ASIACCS 2011 - AFRICACRYPT 2011
2010   ICISC 2010 - ISPEC 2010 - NSS 2010 - EuroPKI 2010 - ACSA-10
2009   ICISC 2009 - ISPEC 2009 - NSS 2009 - EuroPKI 2009 - SecureComm 2009 - ISC 2009
2008   Pairing 2008 - SECRYPT 2008 - ProvSec 2008 - CANS 2008 - IWSEC 2008 - ESORICS 2008
2007   Pairing 2007 - SECRYPT 2007 - ProvSec 2007 - CANS 2007

Book chapter
  1. with E. R. Verheul. Pseudonymized Data Sharing. In J. Nin and J. Herranz (eds.), Privacy and Anonymity in Information Management Systems: New Techniques for New Practical Problems, Advanced Information and Knowledge Processing, Springer. 157-179 (2010) DOI
Journal Papers
  1. with Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala and Srinivas Vivek. Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. Journal of Cryptographic Engineering, Springer. To appear. Open Access
  2. with Sidi Mohamed El Yousfi Alaoui, Ozgur Dagdelen, Pascal Veron and Pierre-Louis Cayrel. Extended Security Arguments for Signature Schemes. Designs, Codes and Cryptography, Elsevier. Volume 78, Issue 2: 441-461 (2016)
  3. Compact Hierarchical Identity-Based Encryption based on a Harder Decisional Problem. International Journal of Computer Mathematics 92(3): 463-472 (2015)
  4. with Srinivas Vivek. Limits of a Conjecture on a Leakage-Resilient Cryptosystem. Information Processing Letters, Elsevier. Volume 114, Issue 4 (2014) 192-196 DOI
  5. A note on an IND-CCA2 secure Paillier-based cryptosystem. Information Processing Letters, Elsevier. Volume 113, Issues 22-24 (2013) 913-194 DOI
  6. with R. Roman, and J. Lopez. On the Energy Cost of Authenticated Key Agreement in Wireless Sensor Networks. Wireless Communications and Mobile Computing, John Wiley & Sons. Volume 12, Issue 1 (2012) 133 - 143 DOI
  7. with J. Herranz and E. Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. Advances in Mathematics of Communications, American Institute of Mathematical Sciences. Volume 4, Number 4 (2010) 453 - 483
  8. with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Theoretical Computer Science, Elsevier. Volume 410 Numbers 47-49 (2009) 5093-5111
  9. with J. Herranz. On the security of public key cryptosystems with a double decryption mechanism. Information Processing Letters, Elsevier. Volume 108 Issue 5 (2008) 279-283
  10. with P. Morillo and C. Rafols. Improved Certificate-Based Encryption in the Standard Model. Journal of Systems and Software, Elsevier. Vol 81/7 (2008) 1218-1226
  11. with S. Martin, P. Morillo and J. L. Villar. Fujisaki-Okamoto Hybrid Encryption Revisited. International Journal of Information Security, Springer. Volume 4, Number 4 (2005) 228 - 241. (pdf)
Peer-Reviewed Conference Proceedings
  1. with Véronique Cortier, Ralf Küsters, Johannes Müller, and Tomasz Truderung. SoK: Verifiability Notions for E-Voting Protocols. In Proceedings of 37th IEEE Symposium on Security and Privacy, IEEE S&P 2016, San José at the Fairmont, USA, May 21-24 2016.
  2. with David Bernhard, Veronique Cortier, Olivier Pereira and Bogdan Warinschi. SoK: A comprehensive analysis of game-based ballot privacy definitions. In Proceedings of 36th IEEE Symposium on Security and Privacy, IEEE S&P 2015, San José at the Fairmont, USA, May 18-20 2015.
  3. with Sandra Guasch and Jordi Puiggalí. 2015 Neuchatel's Cast-as-Intended Verification Mechanism. In Proceedings of 5th International Conference on E-voting and Identity, VoteID 2015, Bern, Switzerland, 2-4 September 2015.
  4. with Johann Grossschädl, Zhe Liu, Praveen K. Vadnal and Srinivas Vivek. Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism. In Proceedings of 3rd Security Proofs for Embedded Systems Workshop, PROOFS 2014, Busan, South-Korea, September 26 2014.
  5. with Veronique Cortier, Stephane Glondu and Malika Izabachene. Election Verifiability for Helios Under Weaker Trust Assumptions. In Proceedings of 17th European Symposium on Research in Computer Security, ESORICS 2014, Wroclaw, Poland, September 7-11 2014. Lecture Notes in Computer Science 8713 (2014) 327-344
  6. with Srinivas Vivek. A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme. In Proceedings of 14th IMA International Conference on Cryptography and Coding, IMA CC 2013, December 17-19, 2013, Oxford, UK. Lecture Notes in Computer Science 8308 (2013) 173-192
  7. with Veronique Cortier, Stephane Glondu and Malika Izabachene. Distributed ElGamal a la Pedersen - Application to Helios. In Proceedings of the 12th annual ACM workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany (2013) 131-142
  8. with Srinivas Vivek. A Practical Leakage-Resilient Signature Scheme in the Generic Group Model. In Proceedings of 19th Conference on Selected Areas in Cryptography, SAC 2012, Windsor, Canada, August 16-17, 2012. Lecture Notes in Computer Science 7707 (2013) 50-65
  9. with J. Herranz and J. L. Villar. Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience. In Proceedings of 17th European Symposium on Research in Computer Security, ESORICS 2012, Pisa, Italy, September 10-12, 2012. Lecture Notes in Computer Science 7459 (2012) 627-642
  10. with Sidi Mohamed El Yousfi Alaoui, Ozgur Dagdelen, Pascal Veron and Pierre-Louis Cayrel. Extended Security Arguments for Signature Schemes. In Proceedings of 5th African International Conference on Cryptology, AfricaCrypt 2012, Ifrane, Morocco, July 10-12, 2012. Lecture Notes in Computer Science 7374 (2012) 19-34
  11. with J-H. Hoepman. Non-interactive Distributed Encryption: A New Primitive for Revocable Privacy. In Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society, WPES 2011, Chicago, IL, USA (2011) 81-92
  12. Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman. In Proceedings of 4th International Conference on Pairing-based Cryptography, Pairing 2010, Yamanaka Hot Spring, Ishikawa, Japan, December 13-15, 2010. Lecture Notes in Computer Science 6487 (2010) 367-376
  13. with Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schroeder. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. In Proceedings of 3rd African International Conference on Cryptology, AfricaCrypt 2010, Stellenbosch, South Africa, May 3-6, 2010. Lecture Notes in Computer Science 6055 (2010) 333-350
  14. with F. D. Garcia. A Schnorr-like Lightweight Identity-Based Signature Scheme. In Proceedings of 2nd African International Conference on Cryptology, AfricaCrypt 2009, Gammarth, Tunisia, June 21-25, 2009. Lecture Notes in Computer Science 5580 (2009) 135-148
  15. Breaking and Repairing Damgard et al. Public Key Encryption Scheme with Non-interactive Opening. In Topics in Cryptology - CT-RSA 2009: The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Lecture Notes in Computer Science 5473 (2009) 389-398
  16. with R. Roman, and J. Lopez. A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. In Proceedings of the 7th International Conference on Cryptology and Network Security, CANS 2008, Hong Kong, China. Lecture Notes in Computer Science 5339 (2008) 120-132
  17. with J. Baek, W. Susilo and J. Zhou. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). In Proceedings of the Sixth Conference on Security and Cryptography for Networks, SCN 2008, Amalfi, Italy. Lecture Notes in Computer Science 5229 (2008) 358-374
  18. with F. D. Garcia and P. van Rossum. Computational Soundness of Non-Malleable Commitments. In Proceedings of the 4th Information Security Practice and Experience Conference, ISPEC 2008, Sydney, Australia. Lecture Notes in Computer Science 4991 (2008) 361-376
  19. with J. Herranz and E. Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. In Proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2006, Shanghai, China. Lecture Notes in Computer Science 4284 (2006) 178–193.
  20. with R. Corin and J-H. Hoepman. Securing data accountability in decentralized systems. In Proceedings of 1st International Workshop on Information Security, IS'06 (in conjunction with OTM Workshops 2006). Montpellier, France, 2006. Lecture Notes in Computer Science 4277 (2006) 626-635.
  21. with E. Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 5th Conference on Security and Cryptography for Networks, SCN 2006. Maiori, Italy, 2006. Lecture Notes in Computer Science 4116 (2006) 173-185.
  22. with J. Herranz. A Generic Construction for Token-Controlled Public Key Encryption. In Proceedings of 10th Financial Cryptography and Data Security Conference, FC 2006. Anguilla, British West Indies, 2006. Lecture Notes in Computer Science 4107 (2006) 177–190.
  23. with E. Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. In Proceedings of 11th Australasian Conference on Information Security and Privacy, ACISP 2006. Melbourne, Australia, 2006. Lecture Notes in Computer Science 4058 (2006) 336-347.
  24. with P. Morillo and C. Rafols. Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. In Proceedings of Third European PKI Workshop: theory and practice, EuroPKI 2006. Torino, Italy, 2006. Lecture Notes in Computer Science 4043 (2006) 81-91.
  25. A Separation between Selective and Full-identity Security Notions for Identity-based Encryption. The 2006 International Conference on Computational Science and its Applications, ICCSA 2006. Glasgow, United Kingdom. Lecture Notes in Computer Science 3982 (2006) 318-326.
  26. with N. Attrapadung, Y. Cui, G. Hanaoka, I. Hasuo, H. Imai, K. Matsuura, P. Yang and R. Zhang. Relations among notions of security for identity based encryption schemes. In Proceedings of 7th Latin American Theoretical Informatics Symposium, LATIN 2006. Valdivia, Chile, 2006. Lecture Notes in Computer Science 3887 (2006) 130-141.
  27. Boneh-Franklin Identity Based Encryption Revisited. In Proceedings of 32nd International Colloquium on Automata, Languages and Programming, ICALP 2005. Lisboa, Portugal 2005. Lecture Notes in Computer Science 3580 (2005) 791-802. (pdf)
  28. with S. Martin, T. Takagi and J. L. Villar. A provably secure elliptic curve scheme with fast encryption. In Proceedings of INDOCRYPT 2004, Chennai, India. Lecture Notes in Computer Science 3348 (2004) 245-259. (pdf)
  29. with S. Martin, P. Morillo and J. L. Villar. Easy Verifiable Primitives and Practical Public Key Cryptosystems In Proceedings of Information Security Conference 2003,  ISC 2003. Bristol, United Kingdom 2003. Lecture Notes in Computer Science 2851 (2003) 69-83. (pdf)
  30. with S. Martin, P. Morillo and J. L. Villar. A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. In Proceedings of Public Key Cryptography PKC 2003. Miami, USA 2003. Lecture Notes in Computer Science 2567 (2003) 279-291. (pdf)
  31. with S. Martin, P. Morillo and J. L. Villar. An IND-CPA cryptosystem from Demytko's primitive. In Proceedings of 2003 IEEE Information Theory Workshop (2003) 167-170. IEEE press. (pdf)
  32. with S. Martin and J. L. Villar. The security of PSEC-KEM versus ECIES-KEM. Full version. In Proceedings of 26th Symposium on Information Theory in the BeNeLux, Brussels, Belgium (2005) 17-27. (pdf)
  33. with J. L. Villar. An instantiation of the Cramer-Shoup encryption paradigm using bilinear map groups. In Proceedings of Workshop on Mathematical Problems and Techniques in Cryptology, Bellaterra, Spain (2005). (pdf)
  34. with S. Martin, P. Morillo and J. L. Villar. An efficient semantically secure elliptic curve cryptosystem based on KMOV. In Proceedings of International Workshop on Coding and Cryptography WCC 2003, pp. 213-221. (pdf)
Theses

Design and Analysis of Semantically Secure Public Key Encryption Schemes. PhD Thesis, Universitat Politecnica de Catalunya (2004). Advisor: Sebastia Martin.
Constructions with ruler and compass on the lemniscate (in catalan). Master Thesis, Universitat Politecnica de Catalunya (1999). Advisor: J.C. Lario.

Previous research positions

(2014-2015) Senior Researcher, Scytl
, Barcelona, Spain.
(2012-2014) Researcher, LORIA, CNRS, Nancy, France.
(2008-2012) Research Associate, Laboratory of Algorithmics, Cryptology and Security, Faculty of Science, Technology and Communication, University of Luxembourg, Luxembourg.
(2007-2008) Postdoc at Applied Crypto Team, Computer Science Department, University of Malaga, Malaga, Spain.
(2007) Postdoc at Crypto Team, Computer Science Department, Ecole Normale Superieure, Paris, France.
(2004-2006) Postdoc at Security of Systems, Institute for Computing and Information Sciences, Radboud University Nijmegen, Nijmegen, The Netherlands.
(2001-2004) PhD student and junior researcher at Research Group on Mathematics Applied to Cryptography, Department of Applied Mathematics IV, Universitat Politecnica de Catalunya, Barcelona, Spain.



Others

Last updated: 29 March, 2016.